Security / Crypto
Decode JWTs, generate hashes and HMACs, create strong passwords, check password strength, and generate UUIDs. All operations run locally for maximum security.
Encrypt and decrypt text with AES-GCM using a password. Runs entirely in your browser.
Derive a key from a password using PBKDF2 (SHA-256). Configure salt and iterations.
Calculate SHA-1 and SHA-256 fingerprints of a PEM certificate in colon-separated hex.
Upload a file and calculate its MD5, SHA-1, SHA-256, and SHA-512 checksums.
Paste a PEM CSR and decode its subject, public key algorithm, and signature algorithm.
Fill in your details and get a ready-to-run openssl command to generate a CSR and key.
Upload a .der file and convert it to PEM format with the appropriate header and footer.
Generate SHA-1, SHA-256, SHA-384, and SHA-512 cryptographic hashes from any text.
Generate HMAC-SHA-256/384/512 message authentication codes using a secret key.
Decode and inspect JSON Web Token header and payload.
Generate an MD5 hash from any text. Pure JavaScript implementation, runs client-side.
Generate strong, random passwords with customizable options.
Analyze password strength by checking length, character variety, and entropy.
Paste a PEM private or public key to detect its type, algorithm, and key size.
Convert a PEM certificate or key to binary DER format and download the .der file.
Generate RSA key pairs (2048 or 4096-bit) and export as PEM in your browser.
Generate an RSA key pair and get the OpenSSL command to create a self-signed certificate.
Generate an RSA SSH key pair. Shows the OpenSSH public key and the PEM private key.
Paste a PEM certificate and decode its subject, issuer, validity dates, SANs, and more.
Find out how many days until an SSL certificate expires. Paste a PEM or enter a date.
Generate time-based one-time passwords (RFC 6238) from a Base32 secret key.
Generate random UUIDs (v4) for use as unique identifiers.
Generate time-ordered UUID v7 identifiers with embedded millisecond timestamps.
FAQ
- Is it safe to decode JWTs here?
- Yes. JWT decoding happens entirely in your browser. The token is never sent to any server. Only the payload is decoded — verification requires the secret key.
- Which hash algorithms are supported?
- The hash generator supports MD5, SHA-1, SHA-256, SHA-384, and SHA-512 using the Web Crypto API built into your browser.